{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:23:19Z","timestamp":1768897399223,"version":"3.49.0"},"reference-count":25,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Robust reversible watermarking in an encrypted domain is a technique that preserves privacy and protects copyright for multimedia transmission in the cloud. In general, most models of buildings and medical organs are constructed by three-dimensional (3D) models. A 3D model shared through the internet can be easily modified by an unauthorized user, and in order to protect the security of 3D models, a robust reversible 3D models watermarking method based on homomorphic encryption is necessary. In the proposed method, a 3D model is divided into non-overlapping patches, and the vertex in each patch is encrypted by using the Paillier cryptosystem. On the cloud side, in order to utilize addition and multiplication homomorphism of the Paillier cryptosystem, three direction values of each patch are computed for constructing the corresponding histogram, which is shifted to embed watermark. For obtaining watermarking robustness, the robust interval is designed in the process of histogram shifting. The watermark can be extracted from the symmetrical direction histogram, and the original encrypted model can be restored by histogram shifting. Moreover, the process of watermark embedding and extraction are symmetric. Experimental results show that compared with the existing watermarking methods in encrypted 3D models, the quality of the decrypted model is improved. Moreover, the proposed method is robust to common attacks, such as translation, scaling, and Gaussian noise.<\/jats:p>","DOI":"10.3390\/sym12030347","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T07:50:53Z","timestamp":1583135453000},"page":"347","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Homomorphic Encryption-Based Robust Reversible Watermarking for 3D Model"],"prefix":"10.3390","volume":"12","author":[{"given":"Li","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science, Hangzhou Dianzi University, Hangzhou 330018, China"}]},{"given":"Shengxian","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hangzhou Dianzi University, Hangzhou 330018, China"}]},{"given":"Shanqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hangzhou Dianzi University, Hangzhou 330018, China"}]},{"given":"Ting","family":"Luo","sequence":"additional","affiliation":[{"name":"Collage of Science and Technology, Ningbo University, Ningbo 315000, China"}]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Warwick, Coventry CV47AL, UK"}]}],"member":"1968","published-online":{"date-parts":[[2020,3,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TMM.2017.2723244","article-title":"Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models","volume":"20","author":"Jiang","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8145","DOI":"10.1007\/s13369-018-3354-4","article-title":"Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models","volume":"43","author":"Shah","year":"2018","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.jvcir.2019.04.015","article-title":"A high-capacity reversible data hiding method for homomorphic encrypted images","volume":"62","author":"Wu","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1109\/TCSVT.2017.2742023","article-title":"Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group","volume":"28","author":"Xiang","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.neucom.2016.12.065","article-title":"A robust and blind 3D watermarking algorithm using multiresolution adaptive parameterization of surface","volume":"237","author":"Liu","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/LSP.2008.2001984","article-title":"Reversible watermarking based on invariability and adjustment on pixel pairs","volume":"15","author":"Weng","year":"2008","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_7","first-page":"402","article-title":"A Robust multibit multiplicative watermark decoder using vector-based hidden markov model in wavelet domain","volume":"1","author":"Amini","year":"2016","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1111\/1467-8659.00412","article-title":"Towards blind detection of robust watermarks in polygonal models","volume":"19","author":"Benedens","year":"2000","journal-title":"Comput. Graph. Forum"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TSP.2003.809385","article-title":"Improved spread spectrum: A new modulation technique for robust watermarking","volume":"51","author":"Malvar","year":"2003","journal-title":"IEEE Trans. Signal Process"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","article-title":"Low distortion transform for reversible watermarking","volume":"21","author":"Coltuc","year":"2012","journal-title":"IEEE Trans. Image Process."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Wu, Q.L., and Wu, M. (2018). Adaptive and blind audio watermarking algorithm based on chaotic encryption in hybrid domain. Symmetry, 10.","DOI":"10.3390\/sym10070284"},{"key":"ref_12","first-page":"161","article-title":"Reversible watermarking: Current status and key issues","volume":"2","author":"Feng","year":"2006","journal-title":"Int. J. Netw. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","article-title":"Reversibility improved data hiding in encrypted images","volume":"94","author":"Zhang","year":"2014","journal-title":"Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.image.2015.09.014","article-title":"Encrypted image-based reversible data hiding with public key cryptography from difference expansion","volume":"39","author":"Shiu","year":"2015","journal-title":"Signal Process. Image Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIM.2009.2022453","article-title":"Reversible watermarking by modulation and security enhancement","volume":"59","author":"Wu","year":"2010","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"16","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.jvcir.2013.11.001","article-title":"Efficient reversible data hiding in encrypted images","volume":"25","author":"Zhang","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_20","first-page":"957","article-title":"Robust and reversible image watermarking algorithm in homomorphic encrypted domain","volume":"29","author":"Xiang","year":"2018","journal-title":"Ruan Jian Xue Bao\/J. Softw."},{"key":"ref_21","first-page":"287","article-title":"A self-similarity based robust watermarking scheme for 3D point cloud models","volume":"16","author":"Ke","year":"2010","journal-title":"Inf. Jpn."},{"key":"ref_22","unstructured":"Feng, X. (2015, January 12\u201313). A new watermarking algorithm for point model using angle quantization index modulation. In Proceeding of the National Conference on Electrical Electronics and Computer Engineering, Xi\u2019an, China."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2455","DOI":"10.1109\/TIP.2013.2253474","article-title":"Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain","volume":"22","author":"Zheng","year":"2013","journal-title":"IEEE Trans. Image Process."},{"key":"ref_25","unstructured":"Donald, K. (1997). The Art of Computer Programming, Addison-Wesley. [3rd ed.]."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/3\/347\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:02:56Z","timestamp":1760173376000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/3\/347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,1]]},"references-count":25,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["sym12030347"],"URL":"https:\/\/doi.org\/10.3390\/sym12030347","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,1]]}}}